Sciweavers

754 search results - page 105 / 151
» Generation of Signatures by Deformations
Sort
View
VTS
2002
IEEE
162views Hardware» more  VTS 2002»
14 years 16 days ago
Self-Testing Second-Order Delta-Sigma Modulators Using Digital Stimulus
Single-bit second-order delta-sigma modulators are commonly used in high-resolution ADCs. Testing this type of modulator requires a high-resolution test stimulus, which is diffic...
Chee-Kian Ong, Kwang-Ting (Tim) Cheng
FSE
2001
Springer
116views Cryptology» more  FSE 2001»
14 years 3 days ago
NESSIE: A European Approach to Evaluate Cryptographic Algorithms
The NESSIE project (New European Schemes for Signature, Integrity and Encryption) intends to put forward a portfolio containing the next generation of cryptographic primitives. The...
Bart Preneel
ENC
2004
IEEE
13 years 11 months ago
On the Hardware Design of an Elliptic Curve Cryptosystem
We present a hardware architecture for an Elliptic Curve Cryptography System performing the three basic cryptographic schemes: DH key generation, encryption and digital signature....
Miguel Morales-Sandoval, Claudia Feregrino Uribe
BIRTHDAY
2008
Springer
13 years 9 months ago
Finite Dimensional Vector Spaces Are Complete for Traced Symmetric Monoidal Categories
We show that the category FinVectk of finite dimensional vector spaces and linear maps over any field k is (collectively) complete for the traced symmetric monoidal category freely...
Masahito Hasegawa, Martin Hofmann, Gordon D. Plotk...
FASE
2008
Springer
13 years 9 months ago
Distributed Behavioural Adaptation for the Automatic Composition of Semantic Services
Services are developed separately and without knowledge of all possible use contexts. They often mismatch or do not correspond exactly to the end-user needs, making direct composit...
Tarek Melliti, Pascal Poizat, Sonia Ben Mokhtar